Sciweavers

153 search results - page 10 / 31
» Privacy Engine for Context-Aware Enterprise Application Serv...
Sort
View
ACSAC
2007
IEEE
15 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
79
Voted
ISORC
2008
IEEE
15 years 3 months ago
Applicability of Web Service Technologies to Reach Real Time Capabilities
Currently the developing process for enterprise applications is improved by the Service Oriented Architecture (SOA) paradigms. With SOAs the creation of modular and clearly defin...
Steffen Prüter, Guido Moritz, Elmar Zeeb, Ral...
IEEEARES
2007
IEEE
15 years 3 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
ATAL
2007
Springer
14 years 11 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
EDBTW
2010
Springer
15 years 4 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...